HackDig : Dig high-quality web security articles for hackers

AT&T, Palo Alto Networks and Broadcom Develop Firewall Framework

New Framework Enables Deployment of Firewalls as Software-Based PlatformsAT&T, Palo Alto Networks and Broadcom have been developing a framework that enables organizations to deploy firewalls as software-based platforms instead of hardware appliances.Called Disaggregated Scalable Firewall (DSFW), the framework was introduced as an expansion to the Distrib
Publish At:2020-03-10 08:55 | Read:452 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Security Infrastructure

Scouting the Adversary: Network Sensor Placement Considerations

Proper Network Sensor Placement Helps Security Analysts Focus on Events That MatterWhether you are fighting a real battle or a cyber battle, having line of sight over the battlefield can mean the difference between victory or defeat. Past readers of this column will already know the importance of gaining and maintaining terrain visibility, which is perhaps t
Publish At:2020-03-04 11:30 | Read:356 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security Security Infrastructure

Cisco Patches Flaws in FXOS, UCS Manager and NX-OS Software

Cisco on Wednesday released patches for 11 vulnerabilities in its products, including multiple flaws that impact Cisco UCS Manager, FXOS, and NX-OS software.The most important of the bugs is a high severity flaw in FXOS and NX-OS that could allow an unauthenticated, adjacent attacker to execute arbitrary code as root. The weakness can also be exploited for d
Publish At:2020-02-27 12:23 | Read:363 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Vulnerabilities

Firefox Gets DNS-over-HTTPS as Default in U.S.

Mozilla has started rolling out encrypted DNS-over-HTTPS (DoH) by default for its Firefox users in the United States. DoH provides increased security for Internet users, the DoH protocol ensures that DNS queries and DNS responses are sent and received over HTTP using TLS. Mozilla has been working on bringing DoH to Firefox since 2017, and tens
Publish At:2020-02-25 22:26 | Read:366 | Comments:0 | Tags:Network Security NEWS & INDUSTRY

State-Sponsored Cyberspies Use Sophisticated Server Firewall Bypass Technique

A threat actor — likely a state-sponsored cyberespionage group — has used a sophisticated technique to allow a piece of malware hosted on a server to communicate with command and control (C2) servers through a firewall.The attack was spotted by Sophos, which has named the method used by the hackers “Cloud Snooper.” The company came across the attack while in
Publish At:2020-02-25 14:15 | Read:335 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Virus & Threats Vir

Cisco Unveils SecureX Security Platform

Cisco on Monday unveiled SecureX, a new cloud-native security platform designed to improve visibility, deliver analytics, and automate common security workflows.SecureX, expected to become generally available in June, will unify visibility across an organization’s security portfolio, including Cisco and third-party solutions. It can help analyze data across
Publish At:2020-02-24 11:20 | Read:309 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Cloud Security Security

Fidelis Adds Risk Simulation and MITRE ATT&CK Mapping to Elevate Platform

Fidelis Cybersecurity has announced a raft of enhancements to its Fidelis Elevate platform, which comprises a network product, an endpoint product, and a deception product. The purpose of the platform is to help defenders understand their environment better than attackers -- which is not always true -- and to arm the defenders with the ability to detect and
Publish At:2020-02-20 12:45 | Read:452 | Comments:0 | Tags:Network Security NEWS & INDUSTRY

Rise in Malware Using Encryption Shows Importance of Network Traffic Inspection

The criminal use of encryption to hide malware is growing rapidly. In the first half of 2019 the use of encryption by malware almost equaled the entire encrypted volume of 2018, and is not likely to slow. Today, nearly a quarter of malware communicates using TLS.The reason is simple: encryption obfuscates malware code, making it difficult to analyze; prevent
Publish At:2020-02-18 16:00 | Read:397 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Malware

What Is a DDoS Attack?

After 20 years of prominence, distributed denial-of-service (DDoS) attacks may be causing more devastating effects than ever. The first DDoS attack occurred way back on July 22, 1999 when a network of 114 computers infected with a malicious script called Trin00 attacked a computer at the University of Minnesota, according to MIT Technology Review. The infect
Publish At:2020-02-15 17:18 | Read:361 | Comments:0 | Tags:Network Security Intelligence & Analytics Application Securi

SOC-as-a-Service Company Cysiv Raises $26 Million

Enterprise SOC-as-a-Service company Cysiv this week announced that it has raised $26 million in a Series A funding round.Cysiv was launched in 2018 as a result of a partnership between Trend Micro and HITRUST, a non-profit organization that focuses on developing data protection standards. Cysiv has spun out of Trend Micro and is now an independent company.Th
Publish At:2020-02-15 16:12 | Read:309 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Cloud Security Security

Security Performance in the Age of Digital Transformation

In a World Where Performance and Scalability are King, Security Stands to be a Significant Barrier to SuccessThe twin pillars of digital innovation are scalability and performance. Cloud and SD-WAN provide agility and flexibility for constantly shifting business requirements, enabling organizations to dynamically scale compute, storage, application delivery
Publish At:2020-02-15 16:11 | Read:310 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security Security Infrastructure

Huawei Hit With New US Charges of Trade Secrets Theft

Chinese tech giant Huawei was hit Thursday with fresh US criminal charges alleging a "decades-long" effort to steal trade secrets from American companies.A US indictment unsealed in New York alleges Huawei and its proxies conspired "to misappropriate intellectual property" from six US firms as part of a strategy to grow and become the world's largest telecom
Publish At:2020-02-15 16:11 | Read:264 | Comments:0 | Tags:Cyberwarfare Network Security NEWS & INDUSTRY

Randori Arms Red Teams With New Automated Attack Platform

Automated Attack Platform Lets Organizations Continuously Hack Themselves to Test Their Attack SurfaceThere are three current approaches to testing company security defenses: internet-facing perimeter scanning, penetration testing, and red teaming. Perimeter scanning evaluates what can be seen from the outside; penetration testing looks for known vulnerabili
Publish At:2020-02-12 13:03 | Read:387 | Comments:0 | Tags:Network Security NEWS & INDUSTRY

Cisco Patches DoS, Information Disclosure Flaws in Small Business Switches

Cisco this week informed customers that some of its Small Business Switches are affected by high-severity vulnerabilities that can be exploited to obtain sensitive device information and to launch denial-of-service (DoS) attacks.The flaws, tracked as CVE-2019-15993 and CVE-2020-3147, were reported to the company by Ken Pyle of DFDR Consulting. Both security
Publish At:2020-01-30 10:15 | Read:602 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Vulnerabilities

UK Approves Restricted Huawei Role in 5G Network

Britain on Tuesday greenlighted a limited role for Chinese telecoms giant Huawei in the country's 5G network, but underscored that "high risk vendors" would be excluded from "sensitive" core infrastructure.London's decision, following a meeting of the National Security Council chaired by Prime Minister Boris Johnson, came shortly after Brussels said it would
Publish At:2020-01-28 10:15 | Read:677 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Security Infrastructure


Share high-quality web security related articles with you:)


Tag Cloud